Skip to content

Commit

Permalink
wip: working tls
Browse files Browse the repository at this point in the history
  • Loading branch information
nixpig committed Jan 20, 2024
1 parent b2925df commit 902bf48
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 2 deletions.
2 changes: 2 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -122,6 +122,8 @@ joubini -p ":3000" -p "api:3001" -p "admin:3002/admin"
1. Specify the `localhost.crt` and `localhost.key` when configuring `joubini`
1. In Chrome, add the `myCA.pem` under `chrome://settings/certificates` -> Authorities
1. Trust certificate: `cp localhost.crt /etc/ca-certificates/trust-source/anchors/ && update-ca-trust extract`
## Motivation
I just wanted an interesting little project to work on in Rust which involves some basic networking stuff and that would actually be useful.
Expand Down
4 changes: 2 additions & 2 deletions scripts/ca.sh
Original file line number Diff line number Diff line change
Expand Up @@ -28,8 +28,8 @@ keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment
subjectAltName = @alt_names
[alt_names]
DNS.1 = $NAME # Be sure to include the domain name here because Common Name is not so commonly honoured by itself
DNS.2 = bar.$NAME # Optionally, add additional domains (I've added a subdomain here)
IP.1 = 192.168.0.13 # Optionally, add an IP address (if the connection which you have planned requires it)
# DNS.2 = bar.$NAME # Optionally, add additional domains (I've added a subdomain here)
# IP.1 = 192.168.0.13 # Optionally, add an IP address (if the connection which you have planned requires it)
EOF
# Create the signed certificate
openssl x509 -req -in $NAME.csr -CA myCA.pem -CAkey myCA.key -CAcreateserial \
Expand Down

0 comments on commit 902bf48

Please sign in to comment.